acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectLegal Aspects
authorR. Colin Johnson
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Cybersecurity Protects Food, Agriculture
From ACM News

Cybersecurity Protects Food, Agriculture

Protecting the U.S. food supply from cyberattack.

Spyware Lurks in Android Smartphones
From ACM News

Spyware Lurks in Android Smartphones

Google's decision to allow its operating system to install third-party apps makes Android smartphones targets for spyware.  

Bluetooth Security Challenged
From ACM News

Bluetooth Security Challenged

Researchers identify a security loophole in the wireless standard.

Post-Quantum Cryptography: Protecting Today from Tomorrow
From ACM News

Post-Quantum Cryptography: Protecting Today from Tomorrow

Crafting more difficult algorithms to protect secrets so they are resilient to future quantum computers is creating, in effect, post-quantum cryptography.

Bulletproofing RISC-V Cores
From ACM News

Bulletproofing RISC-V Cores

The RISC-V open standard instruction-set architecture can improve cybersecurity.

A Tool for Hardening Java Crypto
From ACM News

A Tool for Hardening Java Crypto

A new tool identifies cryptographic vulnerabilities in Java (and soon, in Python) automatically.

 Towards an Unhackable Quantum Internet
From ACM News

Towards an Unhackable Quantum Internet

Harvard University researchers achieve “a milestone along the path to a worldwide quantum Internet.”

AI vs. AI
From ACM News

AI vs. AI

Financial institutions use AI to create "synthetic identities" for customers; hackers use 'bad' AI to fool the 'good' AI.

Keeping Government Out of Your Business
From ACM News

Keeping Government Out of Your Business

The Enforcer software can keep government surveillance from straying into illegality.

Foiling IoT Hackers
From ACM News

Foiling IoT Hackers

Cybersecurity specialists are working to head off hackers trying to use the Internet of Things as their gateway into smart homes.

Demanding the Truth
From ACM News

Demanding the Truth

The role of social media in stopping fake news.

Maintaining U.S. Dominance in AI
From ACM News

Maintaining U.S. Dominance in AI

Standards are seen as a way to eliminate bias and incorporate trustworthiness in artificial intelligence, even as the U.S. seeks to secure its lead in the field...

Hacking the Smart Home via the Internet of Things
From ACM News

Hacking the Smart Home via the Internet of Things

A group of researchers uncovered implementation flaws in Internet of Things devices.

Striking First to Beat Hackers at Their Own Game
From ACM News

Striking First to Beat Hackers at Their Own Game

Researchers can use the same covert channels hackers have taken advantage of to protect a vehicle's control systems.

Overcoming AI Bias with AI Fairness
From ACM News

Overcoming AI Bias with AI Fairness

New tools aim to remove unconscious and other types of bias from algorithms.

Locking Out the Hackers
From ACM News

Locking Out the Hackers

New hardware, services are aimed at identifying malware before it has the chance to execute.

Neuroscience Misses the Meaning
From ACM News

Neuroscience Misses the Meaning

Examining each transistor in a microprocessor using techniques for analyzing how the human brain works did not yield anticipated understanding.

Fixing the Fake News Problem
From ACM News

Fixing the Fake News Problem

Unsubstantiated information can spread like wildfire through social media; new tools aim to make it easy to track down sources of misinformation, no matter where...

Bypassing Rare Minerals
From ACM News

Bypassing Rare Minerals

A Japanese team proposes an alternative to increasingly rare earths.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account